Skip to content

Code injection in dragonfly gem

High severity GitHub Reviewed Published Oct 24, 2017 to the GitHub Advisory Database • Updated Nov 8, 2023

Package

bundler dragonfly (RubyGems)

Affected versions

< 1.0.0

Patched versions

1.0.0
bundler fog-dragonfly (RubyGems)
<= 0.9.15
None
Published by the National Vulnerability Database May 12, 2014
Published to the GitHub Advisory Database Oct 24, 2017
Reviewed Jun 16, 2020
Last updated Nov 8, 2023

Severity

High

EPSS score

Exploit Prediction Scoring System (EPSS)

This score estimates the probability of this vulnerability being exploited within the next 30 days. Data provided by FIRST.
(84th percentile)

Weaknesses

Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')

The product constructs all or part of a command, data structure, or record using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify how it is parsed or interpreted when it is sent to a downstream component. Learn more on MITRE.

CVE ID

CVE-2013-5671

GHSA ID

GHSA-qrgf-jqqm-x7xv

Source code

Credits

Loading Checking history
See something to contribute? Suggest improvements for this vulnerability.